Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
0431185b131ede6799d0b4859f3220aa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0431185b131ede6799d0b4859f3220aa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0431185b131ede6799d0b4859f3220aa_JaffaCakes118.exe
-
Size
52KB
-
MD5
0431185b131ede6799d0b4859f3220aa
-
SHA1
cde0b610c2dd3e21117196b767751c944229bc7f
-
SHA256
2de40989d9487592ae8b40934aea74e920b0bff0cee1895400c1e8296e5c2c5b
-
SHA512
900cd04ee7f16260392ee11f1c77bad0aa0e9f175a846b801e3f97d5166fef308820ab503d89898e5312712565257711c67763bffe3526419e39dc0579a0de1c
-
SSDEEP
384:/TXJLlZg5qGe/4N2pIXAEW9gYZUYD5qZAPCE/QARYaA/VLHqWJVBqdFDLF85SfHl:/7JLlaVM4NbiLpD5YAACWJVBd5Sfs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0431185b131ede6799d0b4859f3220aa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2056 0431185b131ede6799d0b4859f3220aa_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52287e0ca98f7784334976cf277066d7d
SHA17e34bb1982ee00ec618f3678e80ce587c2d8fa02
SHA2564c4fecb8bfed64649e39d5c3593ea165a19563c4b4ada138921ef292353d0809
SHA51255ff14856dca97c52d598493fe95c75ebf8cdb263b26fd99cdb4212a75d584434761b8409d8b66f410fd9f67027f5eae3725ba2b6b80d0c783d0321f23ff861d